Описание
ELSA-2024-9098: skopeo security update (MODERATE)
[2:1.16.1-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.16.1
- Related: RHEL-27608
[2:1.16.0-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.16.0
- Resolves: RHEL-47197 RHEL-44886 RHEL-40812
[2:1.15.2-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.15.2
- Related: RHEL-27608
[2:1.15.1-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.15.1
- Resolves: RHEL-35443
[2:1.15.0-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.15.0
- Resolves: RHEL-29277
[2:1.14.3-0.1]
- update to the latest content of https://github.com/containers/skopeo/tree/release-1.14 (https://github.com/containers/skopeo/commit/1c2ab99)
- Related: RHEL-2112
[2:1.14.1-2]
- Switch to the maint branch
- Related: Jira:RHEL-2112
[2:1.14.1-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.14.1
- Related: RHEL-2112
[2:1.14.0-1]
- bump to v1.14.0
- Related: Jira:RHEL-2112
[2:1.13.3-3]
- Rebuild with golang 1.20.10
- Related: Jira:RHEL-2786
[2:1.13.3-2]
- Rebuild with golang 1.21.3
- Related: Jira:RHEL-2786
[2:1.13.3-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.13.3
- Related: #2176063
[2:1.13.2-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.13.2
- Related: #2176063
[2:1.13.1-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.13.1
- Related: #2176063
[2:1.13.0-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.13.0
- Related: #2176063
[2:1.12.0-3]
- rebuild for following CVEs: CVE-2022-41724 CVE-2022-41725 CVE-2023-24537 CVE-2023-24538 CVE-2023-24534 CVE-2023-24536 CVE-2022-41723 CVE-2023-24539 CVE-2023-24540 CVE-2023-29400
- Resolves: #2179967
- Resolves: #2187323
- Resolves: #2187384
- Resolves: #2203703
- Resolves: #2207523
[2:1.12.0-2]
- remove fakeroot from skopeo-tests
- Related: #2176063
[2:1.12.0-1]
- update to 1.12.0
- Related: #2176063
[2:1.11.3-0.1]
- update to the latest content of https://github.com/containers/skopeo/tree/release-1.11 (https://github.com/containers/skopeo/commit/d79588e)
- Related: #2176063
[2:1.11.2-0.2]
- update to the latest content of https://github.com/containers/skopeo/tree/release-1.11 (https://github.com/containers/skopeo/commit/8191ef3)
- Related: #2176063
[2:1.11.2-0.1]
- update to the latest content of https://github.com/containers/skopeo/tree/release-1.11 (https://github.com/containers/skopeo/commit/3f98753)
- Related: #2124478
[2:1.11.1-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.11.1
- Related: #2124478
[2:1.11.0-1]
- update to 1.11.0 release
- Related: #2124478
[2:1.11.0-0.4]
- update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/b3b2c73)
- Related: #2124478
[2:1.11.0-0.3]
- update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/fe15a36)
- Related: #2124478
[2:1.11.0-0.2]
- update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/8e09e64)
- Related: #2124478
[2:1.11.0-0.1]
- update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/2817510)
- Related: #2124478
[2:1.10.0-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.10.0
- Related: #2124478
[2:1.9.3-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.9.3
- Related: #2124478
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
skopeo
1.16.1-1.el9
skopeo-tests
1.16.1-1.el9
Oracle Linux x86_64
skopeo
1.16.1-1.el9
skopeo-tests
1.16.1-1.el9
Связанные уязвимости
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.